Summary
That's all for now. It has been a long journey, so thanks for sticking with it! I hope you learned a new trick or two along the way.
Throughout this book, we have discussed the many sides of ICS environment-specific security monitoring. We have only been able to touch on the many different technologies, tools, activities, methodologies, and strategies that are out there to help you visualize the security state of your ICS environment. The next steps are up to you now: your journey has just begun, and I highly recommend that you build a lab, deploy some tools, and then start practicing, experimenting, and perfecting your skills. See what tools and techniques work best for your environment and see what disciplines of the broad security monitoring field best fit your preferences, what interests you the most, and dive deep into that area.
Until next time… never stop learning!